CN112261239B - Plaintext related image encryption method based on PUD adaptive decomposition - Google Patents

Plaintext related image encryption method based on PUD adaptive decomposition Download PDF

Info

Publication number
CN112261239B
CN112261239B CN202010988855.5A CN202010988855A CN112261239B CN 112261239 B CN112261239 B CN 112261239B CN 202010988855 A CN202010988855 A CN 202010988855A CN 112261239 B CN112261239 B CN 112261239B
Authority
CN
China
Prior art keywords
image
pud
plaintext
pseudo
decomposition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010988855.5A
Other languages
Chinese (zh)
Other versions
CN112261239A (en
Inventor
吴永飞
刘西林
岳俊宏
周稻祥
高佩婷
李明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taiyuan University of Technology
Original Assignee
Taiyuan University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taiyuan University of Technology filed Critical Taiyuan University of Technology
Priority to CN202010988855.5A priority Critical patent/CN112261239B/en
Publication of CN112261239A publication Critical patent/CN112261239A/en
Application granted granted Critical
Publication of CN112261239B publication Critical patent/CN112261239B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a plaintext related image encryption method based on PUD self-adaptive decomposition, which carries out self-adaptive PUD decomposition on a plaintext image and carries out scrambling-diffusing operation on a decomposed two-dimensional component. The encryption key adopted by the method is related to the plaintext, the obtained encrypted image can efficiently resist plaintext attack selection and ciphertext attack selection, meanwhile, the method has stronger robustness on the aspects of filtering noise attack, shearing attack and differential attack, the safety and the robustness of the encrypted image are further improved, and the method can be applied to the fields of image safety and image secret communication.

Description

Plaintext related image encryption method based on PUD adaptive decomposition
Technical Field
The invention relates to the technical field of image encryption, in particular to a plaintext related image encryption method based on PUD adaptive decomposition.
Background
With the rapid development of computer networks and communication technologies, the use and exchange of multimedia content such as digital images, video sequences and audio signals has shown an explosive growth trend. Digital images, which are visual multimedia content, have been widely used in many fields including medical, commercial, and military. For these applications, the transmission of digital images over public channels and storage on cloud platforms must guarantee the security of the images and can only be accessed by authorized authorities. Therefore, the security problem of digital images becomes more and more important, and has become an urgent problem to be solved.
Digital images are different from traditional text messages, and have the characteristics of large data capacity, strong correlation between adjacent pixels, high redundancy and the like, so that traditional text encryption algorithms such as AES, DES and the like are not suitable for image encryption any more. Currently, image encryption methods can be broadly classified into two types of encryption methods, a spatial domain-based encryption method and a transform domain-based encryption method. The encryption operations commonly used in these two types of encryption domains are scramble-scramble operations. Since spatial domain based encryption algorithms typically have limited key space and are permutations in insecure against classical statistical attacks, they do not meet the security requirements. To overcome these limitations, better security can be achieved using displacement diffusion based image encryption techniques in the transform domain, such as Fourier Transform (FT), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT). However, since these transform domain-based encryption algorithms generally use fixed basis functions (trigonometric functions, wavelet functions) in the process of transforming images, the transform domain-based image encryption algorithms also have a risk of low security and being easily broken.
In order to design an image encryption method with strong security, it is difficult to further improve the security and reliability of the algorithm by encrypting the image based on the traditional transform domain (such as discrete FT transform, DCT transform, DWT transform, etc.).
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a plaintext related image encryption method based on PUD adaptive decomposition, which has stronger robustness on the aspects of noise attack, shearing and differential attack and can be applied to the fields of image encryption protection and image secret communication.
The invention is realized by the following technical scheme: the invention provides a plaintext related image encryption method based on PUD adaptive decomposition, which comprises the following steps:
step 1) taking an original plaintext image to be encrypted, setting the decomposition frequency to be N, and generating a pseudo-random sequence by using a pseudo-random number generator;
step 2) carrying out PUD self-adaptive decomposition on the original plaintext image:
decomposing the original plaintext image according to a PUD decomposition technology to obtain three parts of components, namely a two-dimensional component, two one-dimensional components and a gray average value of the original plaintext image;
step 3), image encryption operation:
and encrypting the two-dimensional component obtained by decomposing the original plaintext image by adopting a scrambling-diffusing mode, wherein the adopted secret key is a gray average value and two one-dimensional components subjected to randomization operation, and finally the encrypted image is obtained.
Wherein, in the step 1) of generating the pseudo random sequence by using the pseudo random number generator, the pseudo random number generator is adopted to generate the pseudo random number sequence with 256bit size.
After the original plaintext image to be encrypted is obtained in step 1), the method comprises the step of interpolating the original plaintext image so as to convert the original plaintext image into a pixel value format M.
Wherein, after the step 2) performs PUD self-adaptive decomposition on the original plaintext image to obtain two one-dimensional components, the method comprises the following steps:
for two one-dimensional components F1,G1A randomization operation, which respectively executes an exclusive-or operation with the pseudo-random sequence generated by the pseudo-random number generator to obtain a new one-dimensional component F2,G2
Wherein, the step 3) specifically comprises the following steps:
step 3a) global scrambling is carried out on the pixel values of the two-dimensional components by using a scrambling algorithm, and the similarity relation of adjacent pixels is changed;
and 3b) changing the pixel value of the scrambled two-dimensional component by adopting a diffusion algorithm, so that the encrypted pixel value is different from the initial two-dimensional component pixel value, and the safety of the image is ensured.
Wherein the scrambling algorithm is Arnold transformation.
The diffusion algorithm adopts an exclusive-or operation mode.
Where the encryption algorithm corresponds to the decryption algorithm, in the image decryption algorithm, the reverse operation is performed to correctly restore the decrypted image.
Compared with the prior art, the invention has the following beneficial effects:
the invention provides a plaintext related image encryption algorithm based on PUD self-adaptive decomposition; due to the adaptive nature of the PUD decomposition method, the resulting one-dimensional components are completely absent for different images. Even for the same image, the one-dimensional components obtained after the image decomposition are different by setting different decomposition times. Thus, the image can be encrypted with a sequence related to the plaintext. The technology can effectively resist attack of selecting plaintext and attack of selecting ciphertext. The method has stronger robustness on the aspects of noise attack, shearing attack and differential attack, has higher security and robustness of image confidentiality, and can be applied to the fields of high-level image security and image confidentiality communication.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
FIG. 1 is a schematic flow chart of a plaintext associated image encryption algorithm based on PUD adaptive decomposition according to the present invention.
FIG. 2 is an original diagram of a plaintext associated image encryption algorithm process based on PUD adaptive decomposition according to the present invention.
FIG. 3 is an image obtained by encrypting an original image in a plaintext related image encryption algorithm based on PUD adaptive decomposition according to the present invention.
FIG. 4 is a diagram of histogram effect of the original image of FIG. 2 based on a PUD adaptive decomposition plaintext associated image encryption algorithm.
FIG. 5 is a diagram of histogram effect of the encrypted image of FIG. 3 in a PUD adaptive decomposition-based plaintext associated image encryption algorithm according to the present invention
FIG. 6 is a decrypted image obtained by adding Gaussian noise to an encrypted image by a PUD adaptive decomposition-based plaintext related image encryption algorithm provided by the present invention.
FIG. 7 is a decrypted image obtained by adding salt-pepper noise to an encrypted image by a PUD adaptive decomposition-based plaintext related image encryption algorithm according to the present invention.
FIG. 8 is a schematic diagram of a clipping region of an encrypted image in a plaintext related image encryption algorithm based on PUD adaptive decomposition according to the present invention.
FIG. 9 is a schematic diagram of a PUD adaptive decomposition-based plaintext associated image encryption algorithm clipped according to the area of FIG. 8.
FIG. 10 is an image of the original plaintext image (FIG. 2) changed by a random bit in the plaintext related image encryption algorithm based on PUD adaptive decomposition according to the present invention.
FIG. 11 is a ciphertext image of an original plaintext image in a plaintext related image encryption algorithm based on PUD adaptive decomposition according to the present invention.
FIG. 12 is a ciphertext image after changing an image according to a plaintext related image encryption algorithm based on PUD adaptive decomposition according to the present invention.
FIG. 13 is an absolute difference value of two ciphertext images of a plaintext correlation image encryption algorithm based on PUD adaptive decomposition according to the present invention.
Detailed Description
For a more clear understanding of the technical features, objects and effects of the present invention, embodiments of the present invention will now be described in detail with reference to the accompanying drawings.
As shown in fig. 1, the method for encrypting a plaintext related image based on PUD adaptive decomposition according to this embodiment includes the following steps:
step 1) generation of a pseudo-random number sequence:
generating a pseudo-random number sequence with the size of 512 bits by using an existing random number generator;
step 2) decomposition of a plaintext image:
decomposing an original plaintext image by adopting a PUD decomposition technology to obtain three components, namely a two-dimensional component, two one-dimensional components and a gray average value of the image;
step 3), image encryption operation:
and (3) aiming at the two-dimensional component obtained by decomposing the original plaintext image by the PUD technology, carrying out scrambling-diffusion operation, and finally obtaining the encrypted image.
Preferably, the step 2) specifically comprises the following steps:
step 2a) carrying out PUD decomposition on the original plaintext image to obtain three parts of components, wherein the three parts of components comprise a two-dimensional component, two one-dimensional components and the gray average value of the original image.
And 2b) processing the gray average value of the image by adopting modular operation to obtain two parameters of generalized Arnold transformation.
And 2c) carrying out exclusive OR operation on the two one-dimensional components and the pseudo-random number sequence generated in the step 1) to obtain two random sequences.
Preferably, the step 3) specifically comprises the following steps:
step 3a) scrambling spatial pixels of the two-dimensional components to obtain a scrambled image; preferably, the scrambling algorithm used is Arnold transform;
and 3b) performing exclusive OR operation of rows and columns on the scrambled image by using two randomized bit sequences respectively, and diffusing the image to obtain an encrypted image.
Preferably, the plaintext related image encryption method needs to set the decomposition times in the image encryption process, and different decomposition times can be set for the same image so as to generate completely different keys and further generate completely different encrypted images.
Specifically, the step 1) specifically includes generation of a pseudo-random number sequence, and a pseudo-random number generator is used for generating a pseudo-random number sequence K with the length of 512 bits.
The PUD decomposition algorithm specifically comprising the image in the step 2) comprises the following steps:
step 2.1: selecting the decomposition times, decomposing the original plain text image I to obtain three components, namely a two-dimensional component P and a one-dimensional component F1,G1Gray level average value C of original image00
Step 2.2: obtaining the average value C of the gray level of the image after decomposition00Performing two times of modular operation in the following mode to obtain two parameters p and q of generalized Arnold change;
p=mod(c00×1015,255)
q=mod(c00×1017,255)
step 2.3, decomposing the original image to obtain two one-dimensional components F1,G1Performing XOR operation with the pseudo-random sequence K to obtain two random sequencesSequence F2,G2
Figure BDA0002690157510000061
Figure BDA0002690157510000062
The step 3) specifically comprises an image encryption algorithm, and comprises the following steps:
step 3.1, the pixel positions in the two-dimensional component P are subjected to scrambling transformation by Arnold transformation in the following way to obtain a scrambled image P'.
Figure BDA0002690157510000063
Step 3.2: for the random images P', respectively, use F2,G2And performing exclusive OR on the rows and the columns to finally obtain the encrypted image.
The Lena image shown in fig. 2 is selected as the original plaintext image, and the number of decompositions N is selected to be 5.
The method comprises the following steps: the generation of the pseudo-random number sequence K realizes the generation of the encryption key.
In the step, a random number generator is adopted, and a secret key K with the length of 256 bits is generated as follows:
k ═ 9F7ED402FBF47A4F91F44824E7288a684849B3E8C5F 49538496 A3a83131373A5a510F5FF5DEDC6CD838DB139FB31E11D982C 5148C 7a53B8380CB49AD6ADAC4D7' (hexadecimal form).
Step two: PUD decomposition of original plaintext image:
the second step specifically includes the PUD decomposition of the image, and includes the following steps:
step 1: decomposing an input plaintext image for N times to obtain a two-dimensional component P and a one-dimensional component F1,G1Gray level average value C of original image00
I=P+F1+G1+C00
Taking an experiment as an example, Lena images of 256 × 256 size are decomposed 5 times to obtain two-dimensional components of 256 × 256 size and two 256 long one-dimensional components F1,G1And the mean value of the gray levels C of the plain text image00
Step 2: average value C of image gray scale00Performing a modulus operation to obtain two parameters for scrambling the image, as follows:
p=mod(C00×1015,255)
q=mod(C00×1017,255)
step 3: for two components F1,G1Performing XOR operation with the secret key K to obtain two random sequences F2,G2As follows:
Figure BDA0002690157510000071
Figure BDA0002690157510000072
step three: encrypting the two-dimensional component, wherein the third step specifically comprises an extraction algorithm of the authentication information, and the method comprises the following steps:
step 1, the pixel position in the two-dimensional component P is subjected to scrambling conversion by Arnold conversion in the following way to obtain a scrambled image P'.
Figure BDA0002690157510000073
Step 2: for the random images P', respectively, use F2,G2The specific process is as follows according to the exclusive or of rows and the exclusive or of columns:
performing exclusive-or operation from the 1 st row to the M th row in sequence:
i=1:M;
temp=P’(i,:);
P’(i,:)=P’(i,:)bitxor F2
the exclusive-or operation is performed in order from column 1 to column M:
j=1:M;
temp=P’(:,j);
P’(:,j)=P’(:,j)bitxor G2
and finally obtaining a ciphertext image C.
As shown in fig. 2-3, wherein fig. 2 is an original image and fig. 3 is an encrypted image.
Referring to fig. 4-5, it can be seen that fig. 4 is a histogram of an original Lena plaintext image, and it can be seen that the distribution fluctuation of pixel values is relatively large, and the histogram of an encrypted ciphertext image is as shown in fig. 5, where the distribution frequencies of different grays are uniform and the histogram is flat, and it can be seen that the encryption method described in this embodiment can better resist statistical attack, and the encryption effect is better.
Fig. 6 and 7 show the decryption effect obtained by adding gaussian noise and salt and pepper noise to the ciphertext image, fig. 6 shows the decryption image after adding gaussian noise, and fig. 7 shows the decryption image after adding salt and pepper noise, which shows that the encryption method described in this embodiment can resist noise attack.
Fig. 8 and 9 show the decryption effect obtained after the ciphertext image is cropped, fig. 8 shows the cropping area of the ciphertext image, and fig. 9 shows the decrypted image after the cropping, which shows that the encryption method according to the embodiment can cut the attack.
When selecting a plaintext attack, an attacker can select an image to encrypt, then randomly change the pixel value of the original image by 1bit, encrypt the changed image, and then compare the two encrypted images to find out the clue of the key. If a pixel value is randomly selected from the Lena image and changed by one bit in total, the encrypted image obtained from the original image and the changed image are completely different. As shown in fig. 10-13, fig. 10 is an image of an original Lena image subjected to a random bit change, fig. 11 is a ciphertext image of the original Lena image, fig. 12 is a ciphertext image of the changed image, and fig. 13 is an absolute value difference of two ciphertext images. As can be seen from fig. 13, a random bit of the original plaintext image is randomly changed, and the obtained ciphertext image has a great difference from the ciphertext image of the original image, so that the method described in this embodiment can effectively resist differential attack.
Therefore, the method has strong robustness to image attack operations.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (4)

1. A plaintext related image encryption method based on PUD adaptive decomposition is characterized by comprising the following steps:
step 1) taking an original plaintext image to be encrypted, setting the decomposition frequency to be N, and generating a pseudo-random sequence by using a pseudo-random number generator; in the step of generating the pseudo-random sequence by using the pseudo-random number generator, the pseudo-random number generator is adopted to generate the pseudo-random number sequence with the size of 256 bits; after an original plaintext image to be encrypted is obtained, the method comprises the step of interpolating the original plaintext image so as to convert the original plaintext image into a pixel value format M;
step 2) carrying out PUD self-adaptive decomposition on the original plaintext image:
the PUD self-adaptive decomposition is carried out on an original plaintext image to obtain two one-dimensional components, and the method comprises the following steps:
for two one-dimensional components F1,G1A randomization operation, which respectively executes an exclusive-or operation with the pseudo-random sequence generated by the pseudo-random number generator to obtain a new one-dimensional component F2,G2
Decomposing the original plaintext image according to a PUD decomposition technology to obtain three parts of components, namely a two-dimensional component, two one-dimensional components and a gray average value of the original plaintext image;
step 3), image encryption operation:
the method comprises the following steps of encrypting a two-dimensional component obtained by decomposing an original plaintext image in a scrambling-diffusing mode, and finally obtaining an encrypted image by adopting a secret key comprising a gray average value and two one-dimensional components subjected to randomization operation, wherein the secret key comprises the following steps:
step 3a) global scrambling is carried out on the pixel values of the two-dimensional components by using a scrambling algorithm, and the similarity relation of adjacent pixels is changed;
and 3b) changing the pixel value of the scrambled two-dimensional component by adopting a diffusion algorithm, so that the encrypted pixel value is different from the initial two-dimensional component pixel value, and the safety of the image is ensured.
2. The encryption method for plaintext associated images based on PUD adaptive decomposition according to claim 1, wherein the scrambling algorithm is Arnold transform.
3. The encryption method for plaintext associated images based on PUD adaptive decomposition according to claim 1, wherein the diffusion algorithm is based on XOR operation.
4. The encryption method for plaintext associated images based on PUD adaptive decomposition according to claim 1, wherein the encryption algorithm corresponds to a decryption algorithm, and in the image decryption algorithm, the reverse operation is performed to correctly recover the decrypted images.
CN202010988855.5A 2020-09-18 2020-09-18 Plaintext related image encryption method based on PUD adaptive decomposition Active CN112261239B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010988855.5A CN112261239B (en) 2020-09-18 2020-09-18 Plaintext related image encryption method based on PUD adaptive decomposition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010988855.5A CN112261239B (en) 2020-09-18 2020-09-18 Plaintext related image encryption method based on PUD adaptive decomposition

Publications (2)

Publication Number Publication Date
CN112261239A CN112261239A (en) 2021-01-22
CN112261239B true CN112261239B (en) 2022-05-17

Family

ID=74232360

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010988855.5A Active CN112261239B (en) 2020-09-18 2020-09-18 Plaintext related image encryption method based on PUD adaptive decomposition

Country Status (1)

Country Link
CN (1) CN112261239B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113344762B (en) * 2021-05-24 2022-11-29 太原理工大学 Double scrambling image encryption method based on AFD adaptive decomposition

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1503594A2 (en) * 2003-07-28 2005-02-02 Samsung Electronics Co., Ltd. Discrete wavelet transform unit and method for adaptively encoding a still image based on energy of each block
CN101729854A (en) * 2009-12-24 2010-06-09 公安部第一研究所 Method for distributing code stream encrypting and decrypting keys in SIP video monitoring system
CN102142258A (en) * 2011-03-31 2011-08-03 上海第二工业大学 Wavelet transform and Arnold based adaptive gray-scale watermark embedded method
CN105553639A (en) * 2015-12-10 2016-05-04 北京理工大学 Multi-image encryption and decryption method based on compression sensing
CN108322622A (en) * 2018-02-23 2018-07-24 哈尔滨理工大学 A kind of color digital image encryption method based on 2D-VMD and octuple hyperchaotic system
CN109544436A (en) * 2018-10-26 2019-03-29 天津大学 EVD-HG and DWT-SVD self-adapting watermarking image processing method
CN110084737A (en) * 2019-05-10 2019-08-02 钱涛 A kind of watermark insertion and extracting method based on two-dimensional adaptive Fourier decomposition

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2849565B1 (en) * 2002-12-31 2005-06-03 Medialive ADAPTIVE AND PROGRESSIVE PROTECTION OF FIXED IMAGES CODED IN WAVELET
CN107977580B (en) * 2016-10-25 2020-07-07 中国电信股份有限公司 Medical image encryption and decryption method and device and medical image processing system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1503594A2 (en) * 2003-07-28 2005-02-02 Samsung Electronics Co., Ltd. Discrete wavelet transform unit and method for adaptively encoding a still image based on energy of each block
CN101729854A (en) * 2009-12-24 2010-06-09 公安部第一研究所 Method for distributing code stream encrypting and decrypting keys in SIP video monitoring system
CN102142258A (en) * 2011-03-31 2011-08-03 上海第二工业大学 Wavelet transform and Arnold based adaptive gray-scale watermark embedded method
CN105553639A (en) * 2015-12-10 2016-05-04 北京理工大学 Multi-image encryption and decryption method based on compression sensing
CN108322622A (en) * 2018-02-23 2018-07-24 哈尔滨理工大学 A kind of color digital image encryption method based on 2D-VMD and octuple hyperchaotic system
CN109544436A (en) * 2018-10-26 2019-03-29 天津大学 EVD-HG and DWT-SVD self-adapting watermarking image processing method
CN110084737A (en) * 2019-05-10 2019-08-02 钱涛 A kind of watermark insertion and extracting method based on two-dimensional adaptive Fourier decomposition

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《2D Partial Unwinding—A Novel Non-Linear Phase》;Yanting Li, Liming Zhang;《IEEE TRANSACTIONS ON IMAGE PROCESSING》;20191010;全文 *

Also Published As

Publication number Publication date
CN112261239A (en) 2021-01-22

Similar Documents

Publication Publication Date Title
Cancellaro et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain
CN104680476B (en) The lossless encryption method of coloured image based on two-dimensional discrete wavelet conversion and space-time chaos
Salleh et al. Image encryption algorithm based on chaotic mapping
Liu et al. Cryptanalysis and enhancement of an image encryption scheme based on bit-plane extraction and multiple chaotic maps
Farschi et al. A novel chaotic approach for information hiding in image
Sharma et al. A new image encryption using modified aes algorithm and its comparision with aes
Islam et al. Denoising and error correction in noisy AES-encrypted images using statistical measures
CN114401351B (en) Image encryption and decryption method based on two-dimensional fractional order chaotic mapping
CN112261239B (en) Plaintext related image encryption method based on PUD adaptive decomposition
Sathananthavathi et al. Secure visual communication with advanced cryptographic and ımage processing techniques
Mehmood et al. A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption
Atee et al. Cryptography and image steganography using dynamic encryption on LSB and color image based data hiding
Cancellaro et al. A joint digital watermarking and encryption method
Mohamed et al. Hybrid DCT-DWT watermarking and IDEA encryption of internet contents
Banupriya et al. Video steganography using LSB algorithm for security application
Khan et al. A New Multi Chaos-Based Compression Sensing Image Encryption.
Agarwal et al. Robust and secure watermarking for propagation of digital multimedia by paillier homomorphic cryptosystem with arnold transformation
CN113344762B (en) Double scrambling image encryption method based on AFD adaptive decomposition
Ahmad et al. A multi-level blocks scrambling based chaotic image cipher
Alfadhli et al. Enhancing Standard Encryption Algorithms Using Multilayers Encryption Technique
CN109214199B (en) Image encryption method and system and decryption method and system
Usama et al. Classical and chaotic encryption techniques for the security of satellite images
Talasila et al. The Hybrid Model of LSB—Technique in Image Steganography Using AES and RSA Algorithms
Prajwalasimha et al. Image Encryption based on Pseudo Hadamard Transformation with Constant Co-efficient
Yepdia et al. Multiple-image fusion encryption (MIFE) using discrete cosine transformation (DCT) and pseudo random number generators

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant